US20240070246A1 - Security system and method for controlling access to server and execution of instruction through facial recognition of server user - Google Patents
Security system and method for controlling access to server and execution of instruction through facial recognition of server user Download PDFInfo
- Publication number
- US20240070246A1 US20240070246A1 US18/238,285 US202318238285A US2024070246A1 US 20240070246 A1 US20240070246 A1 US 20240070246A1 US 202318238285 A US202318238285 A US 202318238285A US 2024070246 A1 US2024070246 A1 US 2024070246A1
- Authority
- US
- United States
- Prior art keywords
- security
- user
- target server
- facial
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to a security system and method that identify an actual user by reflecting the results of user face recognition therein and control the server access and command execution of an unauthorized user.
- biometric technology For server access and command execution, biometric technology has been developed to check the authority of users who have attempted access and execution.
- biometric technology is a technology that extracts physical and/or behavioral characteristics of a person (a user) and verifies the identity of the person, and has been already widely used in the field of security technology.
- Biometric recognition may be classified into fingerprint recognition, iris scanning, retina scanning, hand geometry, and facial recognition according to the biometric target. Among them, the facial recognition, which can automatically recognize a bodily part of a user and perform a procedure without requiring the user to perform a specific action, has been widely used for biometric recognition.
- a security procedure is performed only upon initial access. After a user has been authenticated, another user without authority may enter an abnormal command to a security target server by manipulating a terminal, accessing the security target server, without permission. Furthermore, when a terminal is infected with malicious code, another user can remotely control the terminal online and enter an abnormal command to the security target server.
- a user authentication process using face recognition technology is performed in a terminal. Accordingly, when the authentication process of a terminal having relatively weak security is infected with malicious code, a security function through facial recognition may become useless. A security target server may also be exposed to risk, and thus its safety cannot be guaranteed.
- the present invention has been conceived to overcome the above-described problems, and an object of the present invention is to provide a security system and method for controlling server access and command execution through the facial recognition of a server user that can improve security without impairing convenience through the combination of facial recognition technology and access and authority control technology and can block a server access-related task through the checking of whether an unauthorized person is using access even when a server has been already accessed by an authorized user.
- the present invention provides a security system for controlling server access and command execution through the facial recognition of a server user, the security system being equipped with a security proxy server that relays and secures data communication between a computer terminal and a security target server, the security system including: a secure access agent including a face recognition module configured to repeatedly collect and transmit the facial information of a user who is permitted to access the security target server and is accessing the security target server at a designated time point or in a designated situation, and a notification module configured to output a situation of data communication with the security target server, and installed on the terminal and configured to be executed based on the operating system (OS) of the terminal; and the security proxy server including a user information storage module configured to store user information, a security policy storage module configured to store security policies for each user, a relay module configured to relay data communication between the secure access agent and the security target server, and a security processing module configured to check whether the facial image of the facial information received from the face recognition module matches the facial image of the user information through the comparison between them
- a secure access agent
- FIG. 1 is a diagram schematically showing the communication structure of a security system according to the present invention
- FIG. 2 is a block diagram showing the configuration of the security system according to the present invention.
- FIG. 3 is an image showing an embodiment of an input window in which a security target server is set in the security system according to the present invention
- FIG. 4 is an image showing an embodiment of an input window in which a user permitted to access a security target server is set in the security system according to the present invention
- FIG. 5 is an image showing an embodiment of a list of log data related to the security history that has been handled by the security system according to the present invention
- FIG. 6 is a flowchart sequentially showing a security method based on a security system according to the present invention.
- FIGS. 7 A and 7 B is a diagram schematically showing an example of a permitted task of a user in a security system according to the present invention
- FIGS. 8 A, 8 B and 8 C is a diagram schematically showing an example of an unpermitted task of a user in a security system according to the present invention.
- FIGS. 9 A, 9 B and 9 C is an image showing an embodiment of the security process of a security system according to the present invention.
- a part when a part is described as “including” a component, it means that the part may further include one or more other components, not excluding one or more other components, unless otherwise stated.
- the term “unit,” “module,” or the like refers to a unit in which at least one function or operation is processed. This may be implemented as hardware or software, or may be implemented as a combination of hardware and software.
- FIG. 1 is a diagram schematically showing the communication structure of a security system according to the present invention
- FIG. 2 is a block diagram showing the configuration of the security system according to the present invention
- FIG. 3 is an image showing an embodiment of an input window in which a security target server is set in the security system according to the present invention
- FIG. 4 is an image showing an embodiment of an input window in which a user permitted to access a security target server is set in the security system according to the present invention
- FIG. 5 is an image showing an embodiment of a list of log data related to the security history that has been handled by the security system according to the present invention.
- the security system according to the present invention is related to a security process that is performed in a security target server S in a communication system in which a terminal C accesses the security target server S through a security proxy server 100 .
- the security system equipped with the security proxy server 100 that relays and secures data communication between the computer terminal C and the security target server S includes: a secure access agent 100 ′ including a face recognition module 110 configured to repeatedly collect and transmit the facial information of a user who is permitted to access the security target server S and is accessing the security target server S at a designated time point or in a designated situation, and a notification module 120 configured to output a situation of data communication with the security target server S, and installed on the terminal C; and the security proxy server 100 including a user information storage module 140 configured to store user information, a security policy storage module 150 configured to store security policies for each user, a relay module 160 configured to relay data communication between the secure access agent 100 ′ and the security target server S, and a security processing module 170 configured to check whether the facial image of the facial information received from the face recognition module 110 matches the facial image of the user information and to control the relay module 160 to block access to the security target server S or control the communication of a specified value according to security policies for the user information corresponding to the
- the secure access agent 100 ′ further includes a usage state detection module 130 configured to detect a change in the state of the user who is permitted to access the security target server S and is accessing the security target server S and to transfer a signal so that the face recognition module 110 collects the facial information of the user.
- the usage state detection module 130 may transmit a signal so that the face recognition module 110 collects the facial information of the user when a command input in the state of being connected because access to the security target server S is permitted is a command out of authority.
- the facial image is an image acquired by photographing the face of the user without change, and functions to convert the unique face shape of a user into a unique code by vectorizing it using a known face recognition algorithm.
- the unique code is face vector information, is stored in the security environment of the terminal C, and is transmitted to the security proxy server 100 as a component of facial information.
- the secure access agent 100 ′ is an application installed on the user terminal C to perform a security function, and is executed based on the OS of the terminal C to perform self-execution and access to an external communication network.
- the face recognition module 110 configured in the secure access agent 100 ′ is a part programmed to perform a face recognition function in the secure access agent 100 ′, which is an application for a security function, and is processed in connection with related hardware.
- the face recognition module 110 collects a facial image of a current user by using a photographing means (CAM; see FIG. 7 B ), such as a camera, installed in the terminal C.
- CAM photographing means
- the collection of a facial image by the facial recognition module 110 is performed upon user login, and a facial image is also repeatedly collected at every designated time point or in every designated situation.
- the facial recognition module 110 attaches the identify (ID) of the user to the facial image, sets them as facial information, and transmits the facial information to a designated Internet Protocol (IP) address through the OS.
- IP Internet Protocol
- the designated IP address is the IP address of the security proxy server 100 .
- the security system collects a facial image corresponding to the ID at least once through the facial information registration module 190 of the secure access agent 100 ′, and needs to register and manage the facial image by transferring it to the user information storage module 140 of the security proxy server 100 .
- This is an operation necessary to construct the facial image and user information mapping the facial information together in the security proxy server 100 .
- the facial information is composed of the photographed image, the unique code, and the ID.
- the facial information may be composed of only the unique code and the ID.
- the notification module 120 is a part programmed to perform an information output function in the secure access agent 100 ′, which is an application for a security function, and is processed in connection with related hardware.
- the notification module 120 outputs a situation of data communication with the security target server S.
- the situation of data communication is whether the secure connection agent 100 ′ has accessed the security target server S, and a method of providing guidance on whether the access has been made may be various.
- the notification module 120 may simply display only a warning window regarding restriction on data communication in the form of a speech balloon according to a preset process, may forcibly terminate (lock) the screen D (see FIG.
- the terminal C may forcibly terminate a task window (a web page) of the web browser for the security target server S, or may forcibly terminate a task window of a word processor, which is an application that executes a data file received from the security target server S.
- a task window of the web browser or application may be maintained without termination, but the movement of a mouse cursor, text input, or other functional operations in the task window may be restricted.
- the notification module 120 may guide a user to a subsequent procedure for self-verification by displaying a separate independent pop-up window (PU; see FIG. 8 B ) after the above-described task window control.
- the usage state detection module 130 is a part programmed to perform a user recognition function in the secure access agent 100 ′, which is an application for a security function, and is processed in connection with related hardware.
- the usage state detection module 130 detects a change in the state of a user who is permitted to access the security target server S and is accessing the security target server S, and transfers a signal so that the face recognition module 110 collects the facial information of the user.
- the face recognition module 110 repeatedly collects the facial information of the user at every designated time point or in every designated situation.
- the designated time point is a predetermined time interval or a specific time point designated by an administrator or the user.
- the designated situation relates to a change in the state of the user, and may be one or more of various types of changes such as a change in the posture of the user, the departure of the user from the photographing range of the photographing means CAM, the detection of the facial images of two or more people within the photographing range, a change in the image of the worn clothes or accessories of the user, etc.
- the usage state detection module 130 may detect a case where a command entered in the state of being connected because access to the security target server S is permitted is a command out of authority, and may transmit a signal so that the face recognition module 110 collects the facial information of the user.
- an OS-based terminal generates task traffic (session information) during execution, and thus the command is determined by analyzing task traffic information. Accordingly, the usage state detection module 130 or the security processing module 170 determines the command by analyzing the task traffic information generated during a task related to the security target server S, and may determine whether the command is a command out of authority by performing a comparison with the security policies stored in the security policy storage module 150 .
- the command out of authority is a specific command issued beyond the range of business of the user, i.e., a command to access an area inaccessible to the user in the security target server S, a command to check and copy Internet authentication information, a command to leak personal information, a command to install an unauthenticated application, and a command to perform online banking out of the range of business of the user.
- the specific command may be related to a forbidden word, a command subject to intensive monitoring, a command subject to payment, and the like.
- the command out of authority may be various, and various modifications may be implemented within the range that does not depart from the scope of the attached claims.
- the analysis of task traffic information for the determination of a command may be directly performed by the usage state detection module 130 .
- the face recognition module 110 transmits facial information, it may also transmit task traffic information to the security proxy server 100 without the above-described analysis.
- the security proxy server 100 is a gateway for accessing the security target server S, so that the terminal C attempting to access the security target server S needs to perform data communication with the security proxy server 100 . Furthermore, a user face recognition analysis and authentication process is performed in the security proxy server 100 , not in the terminal C itself, so that security performance through facial recognition can be considerably increased. Furthermore, the security proxy server 100 is intended for the security of the security target server S. Accordingly, the security proxy server 100 blocks only a process of communication with the security target server S in the terminal C or blocks only the execution of a specific application for reading a data file received from the security target server S, but is not involved in Internet access and application operation control unrelated to the security target server S. Therefore, as shown in FIG. 8 B , a web page W 2 of the server and a task window of the application unrelated to the security target server S are kept executed without the control of the security proxy server 1000 .
- the security proxy server 100 includes the user information storage module 140 and the security policy storage module 150 , which are a combination of hardware for a data storage function and a storage application, and the relay module 160 and the security processing module 170 , which are a combination of hardware for a data communication relay function and a communication application. Furthermore, the security proxy server 100 may further include an audit log storage module 180 , which is a combination of hardware for a data storage function and a storage application for recording the history of the execution of the security processing module 170 .
- the user information storage module 140 , the security policy storage module 150 , the relay module 160 , and the security processing module 170 are executed based on the operating system (OS) of the security proxy server 100 .
- OS operating system
- the user information storage module 140 is programmed to perform a data storage function in the security proxy server 100 having a data communication relay function, and is processed in connection with related hardware.
- the user information storage module 140 stores user information.
- the user information includes the personal information and ID of the user. Accordingly, information about a login procedure for verifying the identity of the user is retrieved from the user information storage module 140 .
- the user information of the corresponding user may be stored in the user information storage module 140 , or only the user information of a user permitted to access the security target server S may be stored in the user information storage module 140 .
- the user information storage module 140 stores only the user information of a user whose access is permitted, but is not limited to the present embodiment as long as it does not depart from the scope of the attached claims.
- the security policy storage module 150 is programmed to perform a data storage function in the security proxy server 100 having a data communication relay function, and is processed in connection with related hardware.
- the security policy storage module 150 stores security policies for each user.
- the security policies relate to the range of access permitted to the corresponding registered user. When user registration is not performed, access to the security target server S is unconditionally blocked regardless of who the user is.
- the security policy storage module 150 stores a security policy for each command. Accordingly, when a command out of authority is entered to the terminal, the security processing module 170 blocks data communication between the terminal C and the security target server S or blocks the execution of the command out of authority according to a security policy for the command.
- the permitted range of access to the security target server S varies depending on the security level and a security level is designated for each user, so that the management of security policies becomes systematic and efficient.
- an administrator registers the IP address of the security target server S and sets security options to monitor Telnet/SSH services, as shown in FIG. 3 .
- the administrator registers the user information of a user who is permitted to access the security target server S, and designates the range of access of the corresponding user. Since the image of an input window shown in FIGS. 3 and 4 is an example, a method for setting security policies may be variously modified within the range that does not depart from the scope of the attached claims.
- the relay module 160 is programmed to perform a data communication relay function in the security proxy server 100 having a data communication relay function, and is processed in connection with related hardware.
- the relay module 160 relays data communication between the secure access agent 100 ′ and the security target server S.
- the relay module 160 controls data communication under the control of the security processing module 170 .
- the security processing module 170 is programmed to perform a data security function in the security proxy server 100 having a data communication relay function, and is processed in connection with related hardware.
- the security processing module 170 determines whether there is a match by comparing the facial image of the facial information received from the face recognition module 110 with the facial image of the user information, and controls the relay module 160 to collectively block access to the security target server S or control only designated data communication according to security policies corresponding to the user information.
- the security processing module 170 continuously determines whether the current user is an authorized user by comparing the facial information repeatedly collected during the task of the user with the facial image of the user information, and performs control to block the access of the terminal C to the security target server S or block only designated data communication according to security policies for the corresponding user in case of emergency.
- the security processing module 170 queries the secure access agent 100 ′ for the identification ID of the facial information, and the face recognition module 110 retrieves the ID from the facial information registration module 190 and transmits it.
- the security processing module 170 determines a command by analyzing tack traffic information, retrieves security policies corresponding to the command from the security policy storage module 150 , and controls the relay module 160 to collectively block access to the security target server S or control only designated data communication according to the security policies.
- the security proxy server 100 further includes the audit log storage module 180 configured to block the data communication between the security target server S and the terminal C through the security processing module 170 or to, when the command determined through the analysis of task traffic information is a command out of authority, block the data communication or record and store a case where the execution of a command out of authority is blocked as log data. Accordingly, the administrator checks the log data stored in the audit log storage module 180 and updates the secure access agent 100 ′ and the security proxy server 100 . Although in the present embodiment, log data is generated and stored in the audit log storage module 180 when data communication between the security target server S and the terminal C and command execution are blocked, the details of the execution of the security processing module 170 may be recorded as log data regardless of whether data communication and command execution are blocked.
- the log data stored in the audit log storage module 180 may be output in the form of a list by the administrator, as shown in FIG. 5 , and the user may check the security history recorded in the log data and update the security system according to the present invention by.
- FIG. 6 is a flowchart sequentially showing a security method based on a security system according to the present invention
- FIGS. 7 A and 7 B is a diagram schematically showing an example of a permitted task of a user in a security system according to the present invention
- FIGS. 8 A, 8 B and 8 C is a diagram schematically showing an example of an unpermitted task of a user in a security system according to the present invention.
- the security method according to the present invention is performed based on the security system.
- the face recognition module 110 checks the face of a user attempting to access the security target server S and executes a login procedure.
- the entry of account information such as the ID and password PW of a user is basically performed, and a facial information checking process is performed as an additional checking process.
- the photographing means CAM In order to check the facial information of the user, the photographing means CAM generates a photographed image TP by photographing the face U 1 of the user under the control of the face recognition module 110 , the shape of the face U 1 is extracted from the photographed image TP, and a unique code, which is face vector information, is generated through image analysis.
- the facial image may be composed of a photographed image TP of the face U 1 of the user and a unique code, only the unique code may constitute the facial image.
- the face recognition module 110 generates facial information by setting the ID of the user and the facial image as a set.
- the face recognition module 110 transmits the facial information to the security proxy server 100 , and the security processing module 170 of the security proxy server 100 performs a login procedure by comparing not only the ID and password PW of the user but also the facial information received from the face recognition module 110 with the user information and thus verifying the identity of the user.
- the security processing module 170 compares the account information and facial information entered by the user to the secure access agent 100 ′ with the account information and facial information of the user information stored in the user information storage module 140 of the security proxy server 100 .
- the security processing module 170 checks whether the mismatch is caused by the absence of facial information registered as part of the user information or whether the entered facial information actually matches the facial information previously registered as part of the user information.
- the facial information registration module 190 registers the facial information as part of the user information of the corresponding user, the user information storage module 114 is updated, and step S 111 of the login attempt through the secure access agent is re-performed.
- the security processing module 170 blocks access to the security target server S.
- the notification module 120 of the secure access agent 100 ′ pops up a warning window to which the reason for the denial to login is posted so that the user can recognize it.
- the security processing module 170 controls the relay module 160 to enable data communication between the terminal C and the security target server S.
- the security target server S may allow a web page W 1 of a specific site to be output through a web browser configured in the terminal C, or may transmit a security target data file to the terminal C according to the user's selection so that the data file can be executed by a specific application installed on terminal C.
- the face recognition module 110 While a specific application is being executed for reading the data file or the web page W 1 of the security target server S is being displayed after the access to the security target server S, the face recognition module 110 repeatedly controls the photographing means CAM to photograph the face U 1 , or U 2 at every designated time point or in every designated situation, and generates a unique code, which is face vector information for the shape of the face U 1 or U 2 , by analyzing the photographed image TP. Furthermore, the ID checked upon login and the unique code are set as a set and generate facial information. For reference, FIG. 9 C shows a case where a user permitted to access the security target server S is changed to an unauthorized user after the login.
- the face recognition module 110 recognizes the above case as a designated situation and photographs the face U 1 or U 2 by controlling the photographing means CAM, as described above. Since the facial information generation and collection process is the same as the facial information generation and collection process performed upon the login, a detailed description thereof will be omitted.
- the face recognition module 110 transmits the collected facial information to the security proxy server 100 .
- the face recognition module 110 may transmit task traffic information, generated in the process of working with the security target server S, together with the facial information.
- the user state detection module 130 may transmit task traffic information to the security target server S.
- the user state detection module 130 may transmit task traffic information without analysis.
- the user state detection module 130 may check a command by analyzing task traffic information by itself, and may, when the command is a command out of authority, control the face recognition module 110 to collect the facial information of the user and then allow the facial information, together with the command, to be transmitted to the security proxy server 100 .
- the security processing module 170 having received the task traffic information or command together with the facial information checks the facial information and command or the facial information and task traffic information received from the secure access agent 100 ′, and retrieves security policies related to the corresponding command from the security policy storage module 150 .
- the relay module 160 is controlled to completely block or restrictively block access to the security target server S or to block only the execution of the command determined to be a command out of authority according to the security policies.
- the security processing module 170 continues a subsequent process to verify the facial information.
- the security processing module 170 retrieves the facial image of the user from the user information storage module 140 based on the ID of the facial information. The facial image of the corresponding user has been configured in the retrieved user information. The security processing module 170 checks whether the facial image of the facial information and the facial image of the user information match each other by comparing the facial image of the facial information with the facial image of the user information. As described above, since the facial image is composed of a unique code, which is facial vector information, it is determined through the comparison between unique codes whether the facial images match each other.
- the security processing module 170 blocks data communication between the terminal C and the security target server S or blocks the execution of a specific command for the control of a task window according to a process such as that shown in FIG. 9 B or 9 ( c ).
- the facial image of the user information is updated to the facial image of the facial information according to the setting of an administrator. Since the facial image of the facial information is the most recently collected image, it may be most similar to the facial image of facial information to be collected in the future. Accordingly, in order to minimize error in comparison between facial images, it is desirable to update the facial image of the existing user information to the recently collected facial image.
- the present invention provides the effect of improving security without impairing convenience through the combination of facial recognition technology and access and authority control technology and the effect of blocking a server access-related task through the checking of whether an unauthorized person is using access even when a server has been already accessed by an authorized user.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Information Transfer Between Computers (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
A security system and method for controlling server access and command execution through the facial recognition of a server user, where the security system includes: a secure access agent including a face recognition module configured to repeatedly collect and transmit the facial information of a user, and a notification module configured to output a situation of data communication with a security target server; and a security proxy server including a user information storage module configured to store user information, a security policy storage module configured to store security policies, a relay module configured to relay data communication, and a security processing module configured to check whether the facial image of the facial information received from the face recognition module matches the facial image of the user information and to control the relay module to block access to the security target server or block only designated data communication.
Description
- This application claims the benefit of Korean Patent Application No. 10-2022-0109811 filed on Aug. 31 2022, which is hereby incorporated by reference herein in its entirety.
- The present invention relates to a security system and method that identify an actual user by reflecting the results of user face recognition therein and control the server access and command execution of an unauthorized user.
- For server access and command execution, biometric technology has been developed to check the authority of users who have attempted access and execution. As is well known, biometric technology is a technology that extracts physical and/or behavioral characteristics of a person (a user) and verifies the identity of the person, and has been already widely used in the field of security technology. Biometric recognition may be classified into fingerprint recognition, iris scanning, retina scanning, hand geometry, and facial recognition according to the biometric target. Among them, the facial recognition, which can automatically recognize a bodily part of a user and perform a procedure without requiring the user to perform a specific action, has been widely used for biometric recognition.
- However, in the conventional facial recognition technology for server access and command execution, a security procedure is performed only upon initial access. After a user has been authenticated, another user without authority may enter an abnormal command to a security target server by manipulating a terminal, accessing the security target server, without permission. Furthermore, when a terminal is infected with malicious code, another user can remotely control the terminal online and enter an abnormal command to the security target server.
- In addition, conventionally, a user authentication process using face recognition technology is performed in a terminal. Accordingly, when the authentication process of a terminal having relatively weak security is infected with malicious code, a security function through facial recognition may become useless. A security target server may also be exposed to risk, and thus its safety cannot be guaranteed.
- Furthermore, in the case where a security function is performed in a terminal, when unauthorized access is checked, the screen of the terminal itself is blocked or the operation of the terminal is stopped, so that there is the irrationality of interfering with the operation of an application other than a security target.
- Prior art document 1: Korean Patent Application Publication No. 10-2021-0004319 (published on Jan. 13, 2021)
- The present invention has been conceived to overcome the above-described problems, and an object of the present invention is to provide a security system and method for controlling server access and command execution through the facial recognition of a server user that can improve security without impairing convenience through the combination of facial recognition technology and access and authority control technology and can block a server access-related task through the checking of whether an unauthorized person is using access even when a server has been already accessed by an authorized user.
- In order to accomplish the above object, the present invention provides a security system for controlling server access and command execution through the facial recognition of a server user, the security system being equipped with a security proxy server that relays and secures data communication between a computer terminal and a security target server, the security system including: a secure access agent including a face recognition module configured to repeatedly collect and transmit the facial information of a user who is permitted to access the security target server and is accessing the security target server at a designated time point or in a designated situation, and a notification module configured to output a situation of data communication with the security target server, and installed on the terminal and configured to be executed based on the operating system (OS) of the terminal; and the security proxy server including a user information storage module configured to store user information, a security policy storage module configured to store security policies for each user, a relay module configured to relay data communication between the secure access agent and the security target server, and a security processing module configured to check whether the facial image of the facial information received from the face recognition module matches the facial image of the user information through the comparison between them and to control the relay module to block access to the security target server or block only designated data communication according to security policies corresponding to the user information, wherein the user information storage module, the security policy storage module, the relay module, and the security processing module are installed to be executed based on a server OS.
- The above and other objects, features, and advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a diagram schematically showing the communication structure of a security system according to the present invention; -
FIG. 2 is a block diagram showing the configuration of the security system according to the present invention; -
FIG. 3 is an image showing an embodiment of an input window in which a security target server is set in the security system according to the present invention; -
FIG. 4 is an image showing an embodiment of an input window in which a user permitted to access a security target server is set in the security system according to the present invention; -
FIG. 5 is an image showing an embodiment of a list of log data related to the security history that has been handled by the security system according to the present invention; -
FIG. 6 is a flowchart sequentially showing a security method based on a security system according to the present invention; -
FIGS. 7A and 7B is a diagram schematically showing an example of a permitted task of a user in a security system according to the present invention; -
FIGS. 8A, 8B and 8C is a diagram schematically showing an example of an unpermitted task of a user in a security system according to the present invention; and -
FIGS. 9A, 9B and 9C is an image showing an embodiment of the security process of a security system according to the present invention. - The terms used in the conjunction with embodiments have been selected from general terms, which are currently widely used, as much as possible while considering the functions of corresponding components in the present invention, but they may vary depending on the intention of a person skilled in the art, a precedent, the emergence of new technology, and/or the like. Furthermore, in a specific case, there may also be a term selected by the applicant as desired, in which case the meaning thereof will be described in detail in the description of the invention. Accordingly, the terms used herein should be defined based on the meanings of the terms and the overall context of the present specification, not simply based on the names of the terms.
- Throughout the present specification, when a part is described as “including” a component, it means that the part may further include one or more other components, not excluding one or more other components, unless otherwise stated. Furthermore, the term “unit,” “module,” or the like refers to a unit in which at least one function or operation is processed. This may be implemented as hardware or software, or may be implemented as a combination of hardware and software.
- Embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that those skilled in the art can easily practice the present invention. However, the present invention may be implemented in many different forms and is not limited to the embodiments described herein.
- Details of the present invention will be described below based on the accompanying drawings.
-
FIG. 1 is a diagram schematically showing the communication structure of a security system according to the present invention,FIG. 2 is a block diagram showing the configuration of the security system according to the present invention,FIG. 3 is an image showing an embodiment of an input window in which a security target server is set in the security system according to the present invention,FIG. 4 is an image showing an embodiment of an input window in which a user permitted to access a security target server is set in the security system according to the present invention, andFIG. 5 is an image showing an embodiment of a list of log data related to the security history that has been handled by the security system according to the present invention. - Referring to
FIGS. 1 to 5 , the security system according to the present invention is related to a security process that is performed in a security target server S in a communication system in which a terminal C accesses the security target server S through asecurity proxy server 100. - More specifically, the security system equipped with the
security proxy server 100 that relays and secures data communication between the computer terminal C and the security target server S includes: asecure access agent 100′ including aface recognition module 110 configured to repeatedly collect and transmit the facial information of a user who is permitted to access the security target server S and is accessing the security target server S at a designated time point or in a designated situation, and anotification module 120 configured to output a situation of data communication with the security target server S, and installed on the terminal C; and thesecurity proxy server 100 including a userinformation storage module 140 configured to store user information, a securitypolicy storage module 150 configured to store security policies for each user, arelay module 160 configured to relay data communication between thesecure access agent 100′ and the security target server S, and asecurity processing module 170 configured to check whether the facial image of the facial information received from theface recognition module 110 matches the facial image of the user information and to control therelay module 160 to block access to the security target server S or control the communication of a specified value according to security policies for the user information corresponding to the facial information. - Furthermore, in the security system according to the present invention, the
secure access agent 100′ further includes a usagestate detection module 130 configured to detect a change in the state of the user who is permitted to access the security target server S and is accessing the security target server S and to transfer a signal so that theface recognition module 110 collects the facial information of the user. The usagestate detection module 130 may transmit a signal so that theface recognition module 110 collects the facial information of the user when a command input in the state of being connected because access to the security target server S is permitted is a command out of authority. - For reference, the facial image is an image acquired by photographing the face of the user without change, and functions to convert the unique face shape of a user into a unique code by vectorizing it using a known face recognition algorithm. The unique code is face vector information, is stored in the security environment of the terminal C, and is transmitted to the
security proxy server 100 as a component of facial information. - Each of the components will be described below:
- The
secure access agent 100′ according to the present invention is an application installed on the user terminal C to perform a security function, and is executed based on the OS of the terminal C to perform self-execution and access to an external communication network. - The
face recognition module 110 configured in thesecure access agent 100′ is a part programmed to perform a face recognition function in thesecure access agent 100′, which is an application for a security function, and is processed in connection with related hardware. Theface recognition module 110 collects a facial image of a current user by using a photographing means (CAM; seeFIG. 7B ), such as a camera, installed in the terminal C. The collection of a facial image by thefacial recognition module 110 is performed upon user login, and a facial image is also repeatedly collected at every designated time point or in every designated situation. When a facial image composed of an image acquired by photographing the face of a user and a unique code is collected, thefacial recognition module 110 attaches the identify (ID) of the user to the facial image, sets them as facial information, and transmits the facial information to a designated Internet Protocol (IP) address through the OS. In this case, the designated IP address is the IP address of thesecurity proxy server 100. - The security system according to the present invention collects a facial image corresponding to the ID at least once through the facial
information registration module 190 of thesecure access agent 100′, and needs to register and manage the facial image by transferring it to the userinformation storage module 140 of thesecurity proxy server 100. This is an operation necessary to construct the facial image and user information mapping the facial information together in thesecurity proxy server 100. In the present embodiment, the facial information is composed of the photographed image, the unique code, and the ID. Alternatively, the facial information may be composed of only the unique code and the ID. - The
notification module 120 is a part programmed to perform an information output function in thesecure access agent 100′, which is an application for a security function, and is processed in connection with related hardware. Thenotification module 120 outputs a situation of data communication with the security target server S. In this case, the situation of data communication is whether thesecure connection agent 100′ has accessed the security target server S, and a method of providing guidance on whether the access has been made may be various. For example, when the access of thesecure access agent 100′ to the security target server S is blocked, thenotification module 120 may simply display only a warning window regarding restriction on data communication in the form of a speech balloon according to a preset process, may forcibly terminate (lock) the screen D (seeFIG. 7B ) of the terminal C, may forcibly terminate a task window (a web page) of the web browser for the security target server S, or may forcibly terminate a task window of a word processor, which is an application that executes a data file received from the security target server S. Furthermore, a task window of the web browser or application may be maintained without termination, but the movement of a mouse cursor, text input, or other functional operations in the task window may be restricted. Moreover, thenotification module 120 may guide a user to a subsequent procedure for self-verification by displaying a separate independent pop-up window (PU; seeFIG. 8B ) after the above-described task window control. - The usage
state detection module 130 is a part programmed to perform a user recognition function in thesecure access agent 100′, which is an application for a security function, and is processed in connection with related hardware. The usagestate detection module 130 detects a change in the state of a user who is permitted to access the security target server S and is accessing the security target server S, and transfers a signal so that theface recognition module 110 collects the facial information of the user. As described above, theface recognition module 110 repeatedly collects the facial information of the user at every designated time point or in every designated situation. In this case, the designated time point is a predetermined time interval or a specific time point designated by an administrator or the user. Furthermore, the designated situation relates to a change in the state of the user, and may be one or more of various types of changes such as a change in the posture of the user, the departure of the user from the photographing range of the photographing means CAM, the detection of the facial images of two or more people within the photographing range, a change in the image of the worn clothes or accessories of the user, etc. - Furthermore, the usage
state detection module 130 may detect a case where a command entered in the state of being connected because access to the security target server S is permitted is a command out of authority, and may transmit a signal so that theface recognition module 110 collects the facial information of the user. - As is known, an OS-based terminal generates task traffic (session information) during execution, and thus the command is determined by analyzing task traffic information. Accordingly, the usage
state detection module 130 or thesecurity processing module 170 determines the command by analyzing the task traffic information generated during a task related to the security target server S, and may determine whether the command is a command out of authority by performing a comparison with the security policies stored in the securitypolicy storage module 150. - In the present embodiment, the command out of authority is a specific command issued beyond the range of business of the user, i.e., a command to access an area inaccessible to the user in the security target server S, a command to check and copy Internet authentication information, a command to leak personal information, a command to install an unauthenticated application, and a command to perform online banking out of the range of business of the user. Furthermore, the specific command may be related to a forbidden word, a command subject to intensive monitoring, a command subject to payment, and the like. Furthermore, the command out of authority may be various, and various modifications may be implemented within the range that does not depart from the scope of the attached claims. The analysis of task traffic information for the determination of a command may be directly performed by the usage
state detection module 130. Alternatively, when theface recognition module 110 transmits facial information, it may also transmit task traffic information to thesecurity proxy server 100 without the above-described analysis. - The
security proxy server 100 is a gateway for accessing the security target server S, so that the terminal C attempting to access the security target server S needs to perform data communication with thesecurity proxy server 100. Furthermore, a user face recognition analysis and authentication process is performed in thesecurity proxy server 100, not in the terminal C itself, so that security performance through facial recognition can be considerably increased. Furthermore, thesecurity proxy server 100 is intended for the security of the security target server S. Accordingly, thesecurity proxy server 100 blocks only a process of communication with the security target server S in the terminal C or blocks only the execution of a specific application for reading a data file received from the security target server S, but is not involved in Internet access and application operation control unrelated to the security target server S. Therefore, as shown inFIG. 8B , a web page W2 of the server and a task window of the application unrelated to the security target server S are kept executed without the control of the security proxy server 1000. - This Will be Described in More Detail Below:
- The
security proxy server 100 includes the userinformation storage module 140 and the securitypolicy storage module 150, which are a combination of hardware for a data storage function and a storage application, and therelay module 160 and thesecurity processing module 170, which are a combination of hardware for a data communication relay function and a communication application. Furthermore, thesecurity proxy server 100 may further include an auditlog storage module 180, which is a combination of hardware for a data storage function and a storage application for recording the history of the execution of thesecurity processing module 170. The userinformation storage module 140, the securitypolicy storage module 150, therelay module 160, and thesecurity processing module 170 are executed based on the operating system (OS) of thesecurity proxy server 100. - The user
information storage module 140 is programmed to perform a data storage function in thesecurity proxy server 100 having a data communication relay function, and is processed in connection with related hardware. The userinformation storage module 140 stores user information. The user information includes the personal information and ID of the user. Accordingly, information about a login procedure for verifying the identity of the user is retrieved from the userinformation storage module 140. When the user registers in thesecurity proxy server 100 regardless of whether access to the security target server S is permitted, the user information of the corresponding user may be stored in the userinformation storage module 140, or only the user information of a user permitted to access the security target server S may be stored in the userinformation storage module 140. In the present embodiment, the userinformation storage module 140 stores only the user information of a user whose access is permitted, but is not limited to the present embodiment as long as it does not depart from the scope of the attached claims. - The security
policy storage module 150 is programmed to perform a data storage function in thesecurity proxy server 100 having a data communication relay function, and is processed in connection with related hardware. The securitypolicy storage module 150 stores security policies for each user. The security policies relate to the range of access permitted to the corresponding registered user. When user registration is not performed, access to the security target server S is unconditionally blocked regardless of who the user is. Furthermore, the securitypolicy storage module 150 stores a security policy for each command. Accordingly, when a command out of authority is entered to the terminal, thesecurity processing module 170 blocks data communication between the terminal C and the security target server S or blocks the execution of the command out of authority according to a security policy for the command. In the present embodiment, according to the security policies stored in the securitypolicy storage module 150, the permitted range of access to the security target server S varies depending on the security level and a security level is designated for each user, so that the management of security policies becomes systematic and efficient. In the present embodiment, an administrator registers the IP address of the security target server S and sets security options to monitor Telnet/SSH services, as shown inFIG. 3 . In addition, as shown inFIG. 4 , the administrator registers the user information of a user who is permitted to access the security target server S, and designates the range of access of the corresponding user. Since the image of an input window shown inFIGS. 3 and 4 is an example, a method for setting security policies may be variously modified within the range that does not depart from the scope of the attached claims. - The
relay module 160 is programmed to perform a data communication relay function in thesecurity proxy server 100 having a data communication relay function, and is processed in connection with related hardware. Therelay module 160 relays data communication between thesecure access agent 100′ and the security target server S. Therelay module 160 controls data communication under the control of thesecurity processing module 170. - The
security processing module 170 is programmed to perform a data security function in thesecurity proxy server 100 having a data communication relay function, and is processed in connection with related hardware. Thesecurity processing module 170 determines whether there is a match by comparing the facial image of the facial information received from theface recognition module 110 with the facial image of the user information, and controls therelay module 160 to collectively block access to the security target server S or control only designated data communication according to security policies corresponding to the user information. As described above, thesecurity processing module 170 continuously determines whether the current user is an authorized user by comparing the facial information repeatedly collected during the task of the user with the facial image of the user information, and performs control to block the access of the terminal C to the security target server S or block only designated data communication according to security policies for the corresponding user in case of emergency. For reference, although an ID is configured in the facial information in the present embodiment, the ID may not be configured in the facial information due to an unexpected reason. In this case, thesecurity processing module 170 queries thesecure access agent 100′ for the identification ID of the facial information, and theface recognition module 110 retrieves the ID from the facialinformation registration module 190 and transmits it. Furthermore, thesecurity processing module 170 determines a command by analyzing tack traffic information, retrieves security policies corresponding to the command from the securitypolicy storage module 150, and controls therelay module 160 to collectively block access to the security target server S or control only designated data communication according to the security policies. - The process of the
security processing module 170 will be described again below. - The
security proxy server 100 further includes the auditlog storage module 180 configured to block the data communication between the security target server S and the terminal C through thesecurity processing module 170 or to, when the command determined through the analysis of task traffic information is a command out of authority, block the data communication or record and store a case where the execution of a command out of authority is blocked as log data. Accordingly, the administrator checks the log data stored in the auditlog storage module 180 and updates thesecure access agent 100′ and thesecurity proxy server 100. Although in the present embodiment, log data is generated and stored in the auditlog storage module 180 when data communication between the security target server S and the terminal C and command execution are blocked, the details of the execution of thesecurity processing module 170 may be recorded as log data regardless of whether data communication and command execution are blocked. - For reference, the log data stored in the audit
log storage module 180 may be output in the form of a list by the administrator, as shown inFIG. 5 , and the user may check the security history recorded in the log data and update the security system according to the present invention by. -
FIG. 6 is a flowchart sequentially showing a security method based on a security system according to the present invention, FIGS. 7A and 7B is a diagram schematically showing an example of a permitted task of a user in a security system according to the present invention, andFIGS. 8A, 8B and 8C is a diagram schematically showing an example of an unpermitted task of a user in a security system according to the present invention. - Referring to
FIGS. 2 to 9 , the security method according to the present invention is performed based on the security system. - S111: Step of Attempting Login Through Secure Access Agent
- In the security system according to the present invention, the
face recognition module 110 checks the face of a user attempting to access the security target server S and executes a login procedure. - Generally, in the login procedure, the entry of account information such as the ID and password PW of a user is basically performed, and a facial information checking process is performed as an additional checking process. In order to check the facial information of the user, the photographing means CAM generates a photographed image TP by photographing the face U1 of the user under the control of the
face recognition module 110, the shape of the face U1 is extracted from the photographed image TP, and a unique code, which is face vector information, is generated through image analysis. Although the facial image may be composed of a photographed image TP of the face U1 of the user and a unique code, only the unique code may constitute the facial image. Thereafter, when the facial image is generated according to the above process, theface recognition module 110 generates facial information by setting the ID of the user and the facial image as a set. Theface recognition module 110 transmits the facial information to thesecurity proxy server 100, and thesecurity processing module 170 of thesecurity proxy server 100 performs a login procedure by comparing not only the ID and password PW of the user but also the facial information received from theface recognition module 110 with the user information and thus verifying the identity of the user. - S112: Step of Comparing Account Information and Facial Information
- The
security processing module 170 compares the account information and facial information entered by the user to thesecure access agent 100′ with the account information and facial information of the user information stored in the userinformation storage module 140 of thesecurity proxy server 100. - S113: Step of Checking Whether Facial Information is Present in Previously Registered Account Information
- If as a result of the comparison, it is determined that there is a mismatch in facial information, the
security processing module 170 checks whether the mismatch is caused by the absence of facial information registered as part of the user information or whether the entered facial information actually matches the facial information previously registered as part of the user information. - S114: Step of Registering Account Information-Related Facial Information
- When it is determined that the reason for the mismatch in facial information is that facial information is not registered as part of the account information upon login, the facial
information registration module 190 registers the facial information as part of the user information of the corresponding user, the userinformation storage module 114 is updated, and step S111 of the login attempt through the secure access agent is re-performed. - S115: Step of Denying Login
- When the facial information of the user was already configured in the user information upon login attempt and it is determined that the reason for the mismatch in facial information is that the facial information configured in the user information and the facial information collected and generated by the
face recognition module 110 upon login attempt do not match each other, thesecurity processing module 170 blocks access to the security target server S. In addition, thenotification module 120 of thesecure access agent 100′ pops up a warning window to which the reason for the denial to login is posted so that the user can recognize it. - S12: Security Target Server Access Step
- When the ID and password PW of the user are checked and it is determined that there is a match in facial information, the
security processing module 170 controls therelay module 160 to enable data communication between the terminal C and the security target server S. - The security target server S may allow a web page W1 of a specific site to be output through a web browser configured in the terminal C, or may transmit a security target data file to the terminal C according to the user's selection so that the data file can be executed by a specific application installed on terminal C.
- S13: Facial Information Collection Step
- While a specific application is being executed for reading the data file or the web page W1 of the security target server S is being displayed after the access to the security target server S, the
face recognition module 110 repeatedly controls the photographing means CAM to photograph the face U1, or U2 at every designated time point or in every designated situation, and generates a unique code, which is face vector information for the shape of the face U1 or U2, by analyzing the photographed image TP. Furthermore, the ID checked upon login and the unique code are set as a set and generate facial information. For reference,FIG. 9C shows a case where a user permitted to access the security target server S is changed to an unauthorized user after the login. Theface recognition module 110 recognizes the above case as a designated situation and photographs the face U1 or U2 by controlling the photographing means CAM, as described above. Since the facial information generation and collection process is the same as the facial information generation and collection process performed upon the login, a detailed description thereof will be omitted. - The
face recognition module 110 transmits the collected facial information to thesecurity proxy server 100. - In addition, the
face recognition module 110 may transmit task traffic information, generated in the process of working with the security target server S, together with the facial information. Alternatively, in addition to the transmission of the facial information by theface recognition module 110, the userstate detection module 130 may transmit task traffic information to the security target server S. In this case, the userstate detection module 130 may transmit task traffic information without analysis. However, the userstate detection module 130 may check a command by analyzing task traffic information by itself, and may, when the command is a command out of authority, control theface recognition module 110 to collect the facial information of the user and then allow the facial information, together with the command, to be transmitted to thesecurity proxy server 100. - S14: Task Traffic Security Policy Checking Step
- The
security processing module 170 having received the task traffic information or command together with the facial information checks the facial information and command or the facial information and task traffic information received from thesecure access agent 100′, and retrieves security policies related to the corresponding command from the securitypolicy storage module 150. When as a result of the retrieval, it is determined that the above-described command is a command out of authority according to the security policies, therelay module 160 is controlled to completely block or restrictively block access to the security target server S or to block only the execution of the command determined to be a command out of authority according to the security policies. - In contrast, when the command is not a command out of authority, the
security processing module 170 continues a subsequent process to verify the facial information. - S15: Facial Information Comparison Step
- The
security processing module 170 retrieves the facial image of the user from the userinformation storage module 140 based on the ID of the facial information. The facial image of the corresponding user has been configured in the retrieved user information. Thesecurity processing module 170 checks whether the facial image of the facial information and the facial image of the user information match each other by comparing the facial image of the facial information with the facial image of the user information. As described above, since the facial image is composed of a unique code, which is facial vector information, it is determined through the comparison between unique codes whether the facial images match each other. - S16: Control Step
- When as a result of the comparison between the facial image of the facial information and the facial image of the user information, it is determined that they match each other, as shown in
FIGS. 7(a) and 9(a) , data communication between the security target server S and the terminal C is maintained. However, when as a result of the comparison between the facial image of the facial information and the facial image of the user information, it is determined that they do not match each other, as shown inFIGS. 7(a) and 8(a) , thesecurity processing module 170 blocks data communication between the terminal C and the security target server S or blocks the execution of a specific command for the control of a task window according to a process such as that shown inFIG. 9B or 9 (c). - In addition, the facial image of the user information is updated to the facial image of the facial information according to the setting of an administrator. Since the facial image of the facial information is the most recently collected image, it may be most similar to the facial image of facial information to be collected in the future. Accordingly, in order to minimize error in comparison between facial images, it is desirable to update the facial image of the existing user information to the recently collected facial image.
- The present invention provides the effect of improving security without impairing convenience through the combination of facial recognition technology and access and authority control technology and the effect of blocking a server access-related task through the checking of whether an unauthorized person is using access even when a server has been already accessed by an authorized user.
- Although the present invention has been described in detail with reference to the embodiments of the present invention, it can be appreciated by those skilled in the art or those having ordinary knowledge in the art that various modifications and changes may be made to the present invention without departing from the spirit and technical scope of the present invention described in the claims to be described later.
Claims (10)
1. A security system for controlling server access and command execution through facial recognition of a server user, the security system being equipped with a security proxy server that relays and secures data communication between a computer terminal and a security target server, the security system comprising:
a secure access agent including a face recognition module configured to repeatedly collect and transmit facial information of a user who is permitted to access the security target server and is accessing the security target server at a designated time point or in a designated situation, and a notification module configured to output a situation of data communication with the security target server, and installed on the terminal and configured to be executed based on an operating system (OS) of the terminal; and
the security proxy server including a user information storage module configured to store user information, a security policy storage module configured to store security policies for each user, a relay module configured to relay data communication between the secure access agent and the security target server, and a security processing module configured to check whether a facial image of the facial information received from the face recognition module matches a facial image of the user information through a comparison between them and to control the relay module to collectively block access to the security target server or block only designated data communication according to security policies corresponding to the user information, wherein the user information storage module, the security policy storage module, the relay module, and the security processing module are installed to be executed based on a server OS.
2. The security system of claim 1 , wherein the secure access agent further includes a usage state detection module configured to detect a change in a state of the user who is permitted to access the security target server and is accessing the security target server and to transfer a signal so that the face recognition module collects facial information of the user.
3. The security system of claim 1 , wherein the secure access agent further includes a usage state detection module configured to transfer a signal so that the face recognition module collects facial information of the user when a command entered in a state of being connected because access to the security target server is permitted is a command out of authority.
4. The security system of claim 1 , wherein:
the security proxy server relays data communication between a specific application installed on the terminal and the security target server and executes a security process; and
the notification module of the secure access agent outputs a situation of data communication of the specific application.
5. The security system of claim 1 , wherein:
the security processing module transmits a notification signal when access to the security target server is collectively blocked or when only designated data communication is blocked; and
the notification module outputs guide data related to recollection of facial information in response to the notification signal.
6. The security system of claim 2 , wherein:
the usage state detection module checks and transmits task traffic information associated with the security target server generated during an operation of the terminal after access to the security target server; and
the security processing module searches the security policy storage module for a command identified through an analysis of the task traffic information, and, when it is identified as a command out of authority, collectively blocks access to the security target server, blocks only designated data communication, or blocks an execution of the command out of authority according to a security policy for the command out of authority.
7. The security system of claim 2 , wherein:
the usage state detection module identifies a command by analyzing task traffic information associated with the security target server generated during an operation of the terminal after access to the security target server, and transmits the command; and
the security processing module searches the security policy storage module for the command, and, when it is identified as a command out of authority, collectively blocks access to the security target server, blocks only designated data communication, or blocks an execution of the command out of authority according to a security policy for the command out of authority.
8. The security system of claim 6 , wherein the security processing module first checks whether the command is a command out of authority before the comparison of the facial information of the user, and blocks data communication with the security target server or an execution of the command out of authority.
9. The security system of claim 1 , wherein the security processing module updates the facial image of the user information, stored in the user information storage module, to the facial image of the facial information when it is determined that the facial image of the facial information received from the face recognition module matches the facial image of the user information.
10. The security system of claim 7 , wherein the security processing module first checks whether the command is a command out of authority before the comparison of the facial information of the user, and blocks data communication with the security target server or an execution of the command out of authority.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020220109811A KR102504284B1 (en) | 2022-08-31 | 2022-08-31 | Security system and method for controlling instruction executing and connecting to server by facial recognition |
KR10-2022-0109811 | 2022-08-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240070246A1 true US20240070246A1 (en) | 2024-02-29 |
Family
ID=85326675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/238,285 Pending US20240070246A1 (en) | 2022-08-31 | 2023-08-25 | Security system and method for controlling access to server and execution of instruction through facial recognition of server user |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240070246A1 (en) |
JP (1) | JP2024035185A (en) |
KR (1) | KR102504284B1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102741177B1 (en) | 2024-02-19 | 2024-12-11 | 주식회사 피앤피시큐어 | Security devices and security methods that precisely control file and directory access of computer terminals through facial recognition |
CN119128858A (en) * | 2024-11-14 | 2024-12-13 | 东莞市鑫誉精密智造有限公司 | A server security anti-theft trigger alarm system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100866839B1 (en) * | 2007-05-15 | 2008-11-04 | 이바도 | Authorization system using wireless communication terminal |
KR101537564B1 (en) * | 2014-05-20 | 2015-07-20 | (주)지플러스 | Biometrics used relay authorization system and its method |
KR102345825B1 (en) | 2019-07-04 | 2022-01-03 | (주)드림시큐리티 | Method, apparatus and system for performing authentication using face recognition |
KR102188775B1 (en) * | 2020-03-11 | 2020-12-08 | 주식회사 모피어스시큐리티 | Method and system for remotely controlling client terminals using face recognition and face recognition terminal |
-
2022
- 2022-08-31 KR KR1020220109811A patent/KR102504284B1/en active Active
-
2023
- 2023-08-25 US US18/238,285 patent/US20240070246A1/en active Pending
- 2023-08-30 JP JP2023139668A patent/JP2024035185A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
JP2024035185A (en) | 2024-03-13 |
KR102504284B1 (en) | 2023-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240070246A1 (en) | Security system and method for controlling access to server and execution of instruction through facial recognition of server user | |
US10924514B1 (en) | Machine learning detection of fraudulent validation of financial institution credentials | |
US20070300077A1 (en) | Method and apparatus for biometric verification of secondary authentications | |
US20040263315A1 (en) | Information security system interworking with entrance control device and control method thereof | |
US7613929B2 (en) | Method and system for biometric identification and authentication having an exception mode | |
RU2571721C2 (en) | System and method of detecting fraudulent online transactions | |
US20090070860A1 (en) | Authentication server, client terminal for authentication, biometrics authentication system, biometrics authentication method, and program for biometrics authentication | |
CN113315637B (en) | Security authentication method, device and storage medium | |
JP7122693B2 (en) | Face authentication system and face authentication method | |
RU2634174C1 (en) | System and method of bank transaction execution | |
WO2020216131A1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
US11431719B2 (en) | Dynamic access evaluation and control system | |
EP3835980B1 (en) | Adaptive user authentication | |
US20060072793A1 (en) | Security alarm notification using iris detection systems | |
JP2000132515A (en) | Unauthorized access determination device and method | |
JP2008117316A (en) | Business information protection device | |
KR102483980B1 (en) | Security management system for recording and tracking face image information of security policy violator | |
JP2003208269A (en) | Secondary storage device with security mechanism and access control method therefor | |
US11750595B2 (en) | Multi-computer processing system for dynamically evaluating and controlling authenticated credentials | |
US20240289472A1 (en) | Unauthorized access detection system and unauthorized access detection method | |
RU2716735C1 (en) | System and method of deferred authorization of a user on a computing device | |
CN113194088A (en) | Access interception method, device, log server and computer readable storage medium | |
US11755704B2 (en) | Facilitating secure unlocking of a computing device | |
EP3694176B1 (en) | System and method for performing a task based on access rights determined from a danger level of the task | |
KR102483979B1 (en) | System and method for automatic connecting to server through facial recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PNPSECURE INC., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PARK, CHUNOH;JIN, SEONTAE;JEON, JIWUNG;SIGNING DATES FROM 20230816 TO 20230818;REEL/FRAME:064729/0286 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |